SlideShare una empresa de Scribd logo
1 de 17
Lopamudra Das
CONTENTS
: WHAT IS WPA
: HISTORY OF WPA
: CONCEPT OF WPA
: WI-FI PROTECTED ACCESS -2
: GENERAL RECOMMENDATIONS
:ADVANTAGES & LIMITATION OF WPA
: CONCLUSION
: REFERENCIES
What is WPA?
 Wi-Fi Protected Access (WPA) is a response by the

WLAN industry to offer an immediate, a stronger
security solution.

 WPA is intended to be:
 A software/firmware upgrade to existing access points





and NICs.
Inexpensive in terms of time and cost to implement.
Compatible with vendors.
Suitable for enterprise, small sites, home networks.
Runs in enterprise mode or pre-shared key(PSK
mode)
History of WPA
 WPA was created by the Wi-Fi Alliance, an

industry trade group, which owns the
trademark to the Wi-Fi name and certifies
devices that carry that name.

 WPA is designed for use with an IEEE 802.1X

authentication server, which distributes
different keys to each user.
History of WPA

 The Wi-Fi Alliance created WPA to enable introduction of

standard-based secure wireless network products prior to the
IEEE 802.11i group finishing its work.

 The Wi-Fi Alliance at the time already anticipated the WPA2

certification based on the final draft of the IEEE 802.11i
standard.
concept of WPA
 Data is encrypted using the RC4 stream cipher, with a

128-bit key and a 48-bit initialization vector (IV).

 One major improvement in WPA is the Temporal Key

Integrity Protocol (TKIP), which dynamically changes
keys as the system is used.

 When combined with the much larger IV, this defeats

the well-known key recovery attacks on WEP.
General Recommendations
 Conduct a risk assessment for all information that

will travel over the WLAN and restrict sensitive
information.

 Policies and infrastructure for authenticating remote

access users can be applied to WLAN users.

 Perform regular audits of the WLAN using network

management and RF detection tools.
*Minimize signal leakage through

directional antennas and placement of
access points.
*Make sure all equipment being
purchased can be upgraded to
support WPA and WPA 2/AES.
*If using Pre-Shared Key Mode consider
that the shared secret may become
compromised.
THE FUTURE WAP 2
TKIP encryption, 802.1X/EAP authentication and PSK
technology in WPA are features that have been brought
forward from WPA2.
Additionally, WPA2 provides a new, encryption scheme, the
Advanced Encryption Standard (AES).
AES uses a mathematical ciphering algorithm that employs
variable key sizes of 128-, 192- or 256-bits.
WPA2 offers a highly secure “mixed mode” that supports
both WPA and WPA2 client workstations.
ADVANTAGES
It’s flexible: With a wireless network you and your staff can
have uninterrupted access to people, information and tools as
you and they move through the workplace with your mobile
PC.

It’s responsive: As you change your business operations
your wireless network can change with you.

It’s customized: Your wireless network can be configured
the way you want it.-even combined with your current wired
network
It’s fast:

From 11 to 54 Mbps throughput and
advanced roaming capabilities provide reliable access
to e-mail, the Internet, file sharing and other
network resources away from the desk.

It’s cost-effective: Expand and extend your
existing network by simply adding more adapters and
access points. Planning is a no brainier as you need
to buy only what you need.

It’s secure: Current standards utilizes 64- and 128bit WEP encryption and help guard the network from
intruders and protect data in transit. Add in
technology and you have increased WLAN protection
important for mission-critical data.
LIMITATION
* It has a limited bandwidth of about 83.5 MHz.
*Frequency spectrum used by IEEE 802.11b is shared by many
other systems like microwave ovens, cordless phones etc. This
frequency sharing causes interference problem.
* Security techniques are not reliable yet.
APPLICATION
1. Internet access.
2. City wide Wi-Fi.
3. Campus wide Wi-Fi.
4. Direct computer to computer communication.
conclusion
As a subset of WPA2, WPA presents users with a solution
that is both forward- and backward-compatible with
present and future wireless standards.
It offers enterprise-grade protection
importantly, it is available today.

and,

most

WPA allows users, whether they are at home or at work,
to enjoy all the mobility and flexibility that Wi-Fi wireless
computing has to offer, knowing that their data is safely
protected beyond the reach of intruders.
References














“Overview of IEEE 802.11 Security”, www.techonline.com.
www.wikipedia.org
www.lib-asc.ekm.org
www.wi-fi.org
Paper on Wi-Fi security from the Wi-Fi alliance.
www.entecollege.com
www.ieeespectrum.com
THANK YOU

Más contenido relacionado

La actualidad más candente

Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
Fábio Afonso
 

La actualidad más candente (20)

Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Wpa3
Wpa3Wpa3
Wpa3
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
IEEE 802.1 x
IEEE 802.1 xIEEE 802.1 x
IEEE 802.1 x
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 

Destacado (7)

Ch 14
Ch 14Ch 14
Ch 14
 
Wlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC SublayerWlan 802.11n - MAC Sublayer
Wlan 802.11n - MAC Sublayer
 
WLAN
WLANWLAN
WLAN
 
Ppt 802.11n
Ppt 802.11nPpt 802.11n
Ppt 802.11n
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 

Similar a Wi fi protected access

Wireless security
Wireless securityWireless security
Wireless security
paripec
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 

Similar a Wi fi protected access (20)

Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi fi
Wi fiWi fi
Wi fi
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Databook 2018 ver2
Databook 2018 ver2Databook 2018 ver2
Databook 2018 ver2
 

Último

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Wi fi protected access

  • 2. CONTENTS : WHAT IS WPA : HISTORY OF WPA : CONCEPT OF WPA : WI-FI PROTECTED ACCESS -2 : GENERAL RECOMMENDATIONS :ADVANTAGES & LIMITATION OF WPA : CONCLUSION : REFERENCIES
  • 3. What is WPA?  Wi-Fi Protected Access (WPA) is a response by the WLAN industry to offer an immediate, a stronger security solution.  WPA is intended to be:  A software/firmware upgrade to existing access points     and NICs. Inexpensive in terms of time and cost to implement. Compatible with vendors. Suitable for enterprise, small sites, home networks. Runs in enterprise mode or pre-shared key(PSK mode)
  • 4. History of WPA  WPA was created by the Wi-Fi Alliance, an industry trade group, which owns the trademark to the Wi-Fi name and certifies devices that carry that name.  WPA is designed for use with an IEEE 802.1X authentication server, which distributes different keys to each user.
  • 5. History of WPA  The Wi-Fi Alliance created WPA to enable introduction of standard-based secure wireless network products prior to the IEEE 802.11i group finishing its work.  The Wi-Fi Alliance at the time already anticipated the WPA2 certification based on the final draft of the IEEE 802.11i standard.
  • 6. concept of WPA  Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV).  One major improvement in WPA is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used.  When combined with the much larger IV, this defeats the well-known key recovery attacks on WEP.
  • 7. General Recommendations  Conduct a risk assessment for all information that will travel over the WLAN and restrict sensitive information.  Policies and infrastructure for authenticating remote access users can be applied to WLAN users.  Perform regular audits of the WLAN using network management and RF detection tools.
  • 8. *Minimize signal leakage through directional antennas and placement of access points. *Make sure all equipment being purchased can be upgraded to support WPA and WPA 2/AES. *If using Pre-Shared Key Mode consider that the shared secret may become compromised.
  • 9.
  • 10. THE FUTURE WAP 2 TKIP encryption, 802.1X/EAP authentication and PSK technology in WPA are features that have been brought forward from WPA2. Additionally, WPA2 provides a new, encryption scheme, the Advanced Encryption Standard (AES). AES uses a mathematical ciphering algorithm that employs variable key sizes of 128-, 192- or 256-bits. WPA2 offers a highly secure “mixed mode” that supports both WPA and WPA2 client workstations.
  • 11. ADVANTAGES It’s flexible: With a wireless network you and your staff can have uninterrupted access to people, information and tools as you and they move through the workplace with your mobile PC. It’s responsive: As you change your business operations your wireless network can change with you. It’s customized: Your wireless network can be configured the way you want it.-even combined with your current wired network
  • 12. It’s fast: From 11 to 54 Mbps throughput and advanced roaming capabilities provide reliable access to e-mail, the Internet, file sharing and other network resources away from the desk. It’s cost-effective: Expand and extend your existing network by simply adding more adapters and access points. Planning is a no brainier as you need to buy only what you need. It’s secure: Current standards utilizes 64- and 128bit WEP encryption and help guard the network from intruders and protect data in transit. Add in technology and you have increased WLAN protection important for mission-critical data.
  • 13. LIMITATION * It has a limited bandwidth of about 83.5 MHz. *Frequency spectrum used by IEEE 802.11b is shared by many other systems like microwave ovens, cordless phones etc. This frequency sharing causes interference problem. * Security techniques are not reliable yet.
  • 14. APPLICATION 1. Internet access. 2. City wide Wi-Fi. 3. Campus wide Wi-Fi. 4. Direct computer to computer communication.
  • 15. conclusion As a subset of WPA2, WPA presents users with a solution that is both forward- and backward-compatible with present and future wireless standards. It offers enterprise-grade protection importantly, it is available today. and, most WPA allows users, whether they are at home or at work, to enjoy all the mobility and flexibility that Wi-Fi wireless computing has to offer, knowing that their data is safely protected beyond the reach of intruders.
  • 16. References              “Overview of IEEE 802.11 Security”, www.techonline.com. www.wikipedia.org www.lib-asc.ekm.org www.wi-fi.org Paper on Wi-Fi security from the Wi-Fi alliance. www.entecollege.com www.ieeespectrum.com